I'm trying to figure out the best way to encrypt passwords for a forums site I'm working on.
I've decided I'm going to use an encryption such as blowfish. From my understanding, you have a key, and ...

Say I have several different email accounts and I want to use a different encryption key for each of them but still have them all certified under one identity. Is this a good idea and how would I do ...

I have different client applications running on different OS (iOS, Android, Windows Desktop, Windows Phone, Mac, Windows Store -All Native Apps-) I have to decrypt (AES-128) some files (thousands of ...

I have to implement custom key derivation function which basically works as follows:
I have encryption key K in secure container of HSM. K can't be exported and the only way how to use it is through ...

Here is the system:
The client side of our system generates confidential data that needs to be encrypted. Only the user should be able to read them, by that, I mean that even us who managed the data ...

Recently Hashicorp released a secret management solution called Vault. Which is a free and open source general secret storage, acting as a vault for passwords, encryption keys, and hash salts.
I am ...

Note that this question describe hypothetical case, that is never meant to be used in real world.
Server communicates with clients with message structure: client_id, initialization_vector, encrypted ...

I am evaluating IPsec.
I have determined it is best for my case to not use AH (will use PSK for authentication).
One issue I have is that at the start there will be no connectivity, so IKE will not ...

I have OpenPGP key pairs for two of my email addresses. When I created them, I did not know that it was possible to just add another user id to the first key pair. Then I found out it is possible from ...

after getting an answer to Security over multi-streaming such as SCTP i have found that i do not have the capacity to give a public key or certificate to the other end securely (to be sure MitM cannot ...

I'm looking for a way locate a set of keys in memory on command.
Use case would be cold boot attack prevention: a trigger on rack open, scramble the keys in memory followed by shutdown in full disk ...

If I have a 4096 DSA private key used for signing binaries, and I want to ensure that a partner has an identical server using the same private key, can I send the md5sum of the private keys over an ...

I'm reading Cryptography and Network Security Principles and Practices (5th ed, p584) and reading about PGP keyrings, I'm a little confused about the differences between the owner trust field and the ...

One of my software (an R package) has to save on disk users sensitive information.
I encrypt such information using AES encryption using a random key that
is generated at the moment of installation ...

Apologies if this has been asked before.
I am looking to encrypt documents before storing in the cloud.
There will be a separate metadata storage, which could be either internal or cloud hosted.
My ...